Free Republic
Browse · Search
News/Activism
Topics · Post Article


1 posted on 02/17/2016 4:20:38 AM PST by John W
[ Post Reply | Private Reply | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-25 next last
To: John W

Pointless posing ,, the NSA will simply have Taiwan Semi do it for them.


2 posted on 02/17/2016 4:24:17 AM PST by Neidermeyer (Bill Clinton is a 5 star general in the WAR ON WOMEN and Hillary is his Goebbels.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W
No Mr. Cook, "chilling and dangerous" is the thought that the NSA has already looked at the education and IRS tax records of your employees. They figured out who your iOS developers are, and approached them to put the back door in that is already in your phone.

Maybe just a cheap movie plot...but with bammy and his cohorts in crime? I don't think there is anything they would not do.

3 posted on 02/17/2016 4:28:06 AM PST by ThunderSleeps (Stop obarma now! Stop the hussein - insane agenda!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

But I thought Cook liked the back door?


4 posted on 02/17/2016 4:35:32 AM PST by bolobaby
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Jane Long; GOPJ; Grampa Dave; stephenjohnbanker; Arthur Wildfire! March; RoosterRedux; RitaOK; ...
Apple/s CEO Tim Cook better man up and understand he is a citizen of the USA....FIRST AND FOREMOST.

Apple, and he, succeed and make humongous profits on the freedoms that we are afforded here.

The San Bernardino killers and their ilk are enemies of the US....they are bent on destroying our freedoms and everything we stand for.

It is an atrocity that Apple would allow these killers to continue their destruction of America.

5 posted on 02/17/2016 4:37:12 AM PST by Liz (SAFE PLACE? A liberal's mind. Nothing's there. Nothing can penetrate it.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

I hope Cook holds steady to his position that compromising one phone compromises every phone, and that even the heinous nature of the San Bernadino terror attack does not justify compromising every law-abiding citizen’s privacy. And that applies to every other device out there.


6 posted on 02/17/2016 4:40:30 AM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

Odd that the folks that let the media circus rampage through the killers home are now worried about evidence. If you want to catch jihadists, look at the mosques, bastions of enemy combatants hiding in plain sight. Whatever happened to the jihadi’s momma ? I bet if you waterboarded that hag she’d remember a thing or two.


11 posted on 02/17/2016 4:49:50 AM PST by csvset ( Illegitimi non carborundum)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

Keep up the fight for terrorists’ privacy rights. Tell us how you you like jail Timmy!


13 posted on 02/17/2016 4:50:12 AM PST by JhawkAtty
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

Is Cook claiming. there is no way to break into this one phone without unleashing the hounds of hell and compromising the privacy of every iphone owner?

Sounds pretty far fetched.


17 posted on 02/17/2016 4:59:19 AM PST by Will88
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

Hey Mr. Apple, you’d do it, if I were in charge, or, your company would cease to exist and the land where your building once stood will be bare ground sown with a 6 inch bed of salt so nothing would ever grow there again for generations. Have I expressed myself sufficiently?


18 posted on 02/17/2016 5:00:38 AM PST by MeneMeneTekelUpharsin (Freedom is the freedom to discipline yourself so others don't have to do it for you.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

Take it to the Supreme Court so those schmucks can set precedent and create new law now that Alito is gone. We are so screwed.


21 posted on 02/17/2016 5:04:35 AM PST by VTenigma (The Democratic party is the party of the mathematically challenged)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

Why not just give the Feds. the unencrypted data, and not the method for unlocking the “backdoor”? It’s a fricking dead Terrorist for heavens sake.


33 posted on 02/17/2016 5:28:14 AM PST by DAC21 (.z)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W
Apple CEO Cook condemns iPhone 'backdoor' order; calls it 'chilling,' 'dangerous'

One would think that a faggot CEO would approve of a "backdoor" entry into one of their products.

35 posted on 02/17/2016 5:36:33 AM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

I don’t see the problem in this case, aren’t the Perps already dead?


41 posted on 02/17/2016 5:52:11 AM PST by oncebitten
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

Cook is correct.

Anyone who thinks that the Feds would only use it on one phone is delusional


42 posted on 02/17/2016 5:55:39 AM PST by Nifster (I see puppy dogs in the clouds)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

Apple should have quietly offered to help (or complied with a subpoena), put a few pointy heads on this, hopefully provided information, and then have been done with it.

I get Apple’s concern of enabling a backdoor to the device, and if I were an iPhone user would appreciate the knowing apps such as banking were as secure as possible. Apple however is failing to acknowledge that a terrorist organization declared war on America and we’re taking casualties. Lives lost just a few hours downstate - you would think that would resonate in some meaningful way with Apple.

IMO, Apple’s failure to cooperate is a concise declaration of their unwillingness to stand with America against terrorism.


44 posted on 02/17/2016 6:02:14 AM PST by Made In The USA (Rap music: Soundtrack of the retarded.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

Interesting to me that Cook opposes the violation of privacy here, but will at the same time heartily endorse the violation of beliefs for religious business owners who do not want to engage or work for the advancement of relationships that violate Scripture.


46 posted on 02/17/2016 6:05:51 AM PST by SoFloFreeper (I am undecided between Carson, Cruz, Rubio & Trump...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

I wonder how different this thread would have been if Cook wasn’t gay?


66 posted on 02/17/2016 7:26:08 AM PST by dfwgator
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

Is it 1776 yet?


69 posted on 02/17/2016 7:32:35 AM PST by JimRed (Is it 1776 yet? TERM LIMITS, now and forever! Build the Wall, NOW!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

-—Borrowed from another thread ——

Apple uses a dedicated chip to store and process the encryption. They call this the Secure Enclave. The secure enclave stores a full 256-bit AES encryption key.

Within the secure enclave itself, you have the device’s Unique ID (UID) . The only place this information is stored is within the secure enclave. It can’t be queried or accessed from any other part of the device or OS. Within the phone’s processor you also have the device’s Group ID (GID). Both of these numbers combine to create 1/2 of the encryption key. These are numbers that are burned into the silicon, aren’t accessible outside of the chips themselves, and aren’t recorded anywhere once they are burned into the silicon. Apple doesn’t keep records of these numbers. Since these two different pieces of hardware combine together to make 1/2 of the encryption key, you can’t separate the secure enclave from it’s paired processor.

The second half of the encryption key is generated using a random number generator chip. It creates entropy using the various sensors on the iPhone itself during boot (microphone, accelerometer, camera, etc.) This part of the key is stored within the Secure Enclave as well, where it resides and doesn’t leave. This storage is tamper resistant and can’t be accessed outside of the encryption system. Even if the UID and GID components of the encryption key are compromised on Apple’s end, it still wouldn’t be possible to decrypt an iPhone since that’s only 1/2 of the key.

The secure enclave is part of an overall hardware based encryption system that completely encrypts all of the user storage. It will only decrypt content if provided with the unlock code. The unlock code itself is entangled with the device’s UDID so that all attempts to decrypt the storage must be done on the device itself. You must have all 3 pieces present: The specific secure enclave, the specific processor of the iphone, and the flash memory that you are trying to decrypt. Basically, you can’t pull the device apart to attack an individual piece of the encryption or get around parts of the encryption storage process. You can’t run the decryption or brute forcing of the unlock code in an emulator. It requires that the actual hardware components are present and can only be done on the specific device itself.

The secure enclave also has hardware enforced time-delays and key-destruction. You can set the phone to wipe the encryption key (and all the data contained on the phone) after 10 failed attempts. If you have the data-wipe turned on, then the secure enclave will nuke the key that it stores after 10 failed attempts, effectively erasing all the data on the device. Whether the device-wipe feature is turned on or not, the secure enclave still has a hardware-enforced delay between attempts at entering the code: Attempts 1-4 have no delay, Attempt 5 has a delay of 1 minute. Attempt 6 has a delay of 5 minutes. Attempts 7 and 8 have a delay of 15 minutes. And attempts 9 or more have a delay of 1 hour. This delay is enforced by the secure enclave and can not be bypassed, even if you completely replace the operating system of the phone itself. If you have a 6-digit pin code, it will take, on average, nearly 6 years to brute-force the code. 4-digit pin will take almost a year. if you have an alpha-numeric password the amount of time required could extend beyond the heat-death of the universe. Key destruction is turned on by default.

Even if you pull the flash storage out of the device, image it, and attempt to get around key destruction that way it won’t be successful. The key isn’t stored in the flash itself, it’s only stored within the secure enclave itself which you can’t remove the storage from or image it.

Each boot, the secure enclave creates it’s own temporary encryption key, based on it’s own UID and random number generator with proper entropy, that it uses to store the full device encryption key in ram. Since the encryption key is also stored in ram encrypted, it can’t simply be read out of the system memory by reading the RAM bus.

The only way I can possibly see to potentially unlock the phone without the unlock code is to use an electron microscope to read the encryption key from the secure enclave’s own storage. This would take considerable time and expense (likely millions of dollars and several months) to accomplish. This also assumes that the secure enclave chip itself isn’t built to be resistant to this kind of attack. The chip could be physically designed such that the very act of exposing the silicon to read it with an electron microscope could itself be destructive.


78 posted on 02/17/2016 8:00:32 AM PST by frankenMonkey
[ Post Reply | Private Reply | To 1 | View Replies ]

To: John W

86 posted on 02/17/2016 8:25:55 AM PST by Cementjungle
[ Post Reply | Private Reply | To 1 | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-25 next last

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson